malware (25)

How to Spot a Splog

I really enjoy reading blogs. And since you are here, reading my blog post, I’m guessing you do too. Blogs are a great way of gaining information and learning about different perspectives on a wide variety of topics. Unfortunately, spammers have tainted this medium with splogs.

The word splog is a combination of the words spam and blog (from my perspective, it could easily be called blam as well). And that’s exactly what it is, a blog full of spam. Splogs are blogs that usually have plagiarized c

Read more…

What is a Rootkit?

A rootkit is a kind of software that conceals malware from standard detection methods. A good analogy for a rootkit would be a burglar breaking into your house. The burglar is dressed all in black, so that his form blends into the darkness. He tiptoes around to hide his sounds so he’s more likely to go undetected as he steals your belongings. But unlike the burglar, who usually takes your stuff and leaves, an efficient rootkit can stick around for years doing its work, robbing your computer or m

Read more…

Providing a holistic overview on the widespread private use by employees and how many businesses embraced social media in their communications

Examining current social media compliance policies with case studies

Potential security risks, phishing scams, malware attacks,

Protection of (fair use of) intellectual property: The need to address the protection of intellectual property in policies and procedures of the proper business use of social media

Analysing the regulatory requirements on the use

Read more…
According to a 2011 McAfee report on second quarter threats, there were 12 million unique samples of malware for the first half of the year, up 22 percent over 2010, making 2011 the busiest six months in malware history.
As smartphones are used increasingly for mobile payments, and mobile betting, mobile crime exposes mobile operators to business risks from unauthorized account access, fraud, and financial crime.
“Smartphones are an attractive target for criminals as “there is a lot of money invol
Read more…

Security Risks of Web 2.0

Introduction

Let’s start with what’s Web 2.0 before getting in to the risks.

The term Web 2.0 is commonly associated with web applications that facilitate interactive information sharing, interoperability, user-centered design and collaboration on the World Wide Web.

For some of you still not clear of what’s Web 2.0 let me put it down in a different way. Web 2.0 is Facebook or MySpace or Linkedin or Twitter or the blogs or the Wikis or any web site which allows the visitor to interact by posting up

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead